Disclosure of Invention
Therefore, it is necessary to provide a method and an apparatus for controlling an intelligent lock to improve the security of the intelligent lock and ensure the property security of the user.
The first technical scheme of the embodiment of the invention is as follows:
a method of controlling an intelligent lock, comprising: acquiring first unlocking information, wherein the first unlocking information comprises identity card information, fingerprint information and iris information of a target unlocking person, and judging whether the identity card information, the fingerprint information and the iris information of the target unlocking person are consistent; if yes, calculating second unlocking information according to the first unlocking information and a first calculation rule, and judging whether the second unlocking information input by the target unlocking person is acquired within a first preset time length; if so, calculating third unlocking information according to the second unlocking information and a second calculation rule, and judging whether the third unlocking information input by the target unlocking person is acquired within a second preset time length; if so, sending the identity card information, the fingerprint information and the iris information of the target unlocking person to an auditing platform for auditing, and judging whether authorization information that an appointed administrator agrees to unlock can be obtained within a third preset time length; if so, the intelligent lock is unlocked, and the identity card information, the fingerprint information and the iris information of the target unlocking person are stored to the designated address.
The second technical scheme of the embodiment of the invention is as follows:
a control device for an intelligent lock, comprising: the information acquisition module is used for acquiring first unlocking information, wherein the first unlocking information comprises identity card information, fingerprint information and iris information of a target unlocking person, and judging whether the identity card information, the fingerprint information and the iris information of the target unlocking person are consistent or not; the first judgment module is used for calculating second unlocking information according to the first unlocking information and a first calculation rule when the identity card information, the fingerprint information and the iris information of the target unlocking person are consistent, and judging whether the second unlocking information input by the target unlocking person is acquired within a first preset time period or not; the second judging module is used for calculating third unlocking information according to the second unlocking information and a second calculation rule when the second unlocking information input by the target unlocking person is obtained within the first preset time length, and judging whether the third unlocking information input by the target unlocking person is obtained within a second preset time length or not; the third judging module is used for sending the identity card information, the fingerprint information and the iris information of the target unlocking person to an auditing platform for auditing when the third unlocking information input by the target unlocking person is obtained within the second preset time length, and judging whether the authorization information that a designated administrator agrees to unlock can be obtained within the third preset time length; and the authorized unlocking module is used for unlocking the intelligent lock and storing the identity card information, the fingerprint information and the iris information of the target unlocking person to a specified address when the authorized information that the specified administrator agrees to unlock can be acquired within the third preset time.
The third technical scheme of the embodiment of the invention is as follows:
a computer device comprising a memory and a processor, the memory storing a computer program that, when executed by the processor, causes the processor to perform the steps of: acquiring first unlocking information, wherein the first unlocking information comprises identity card information, fingerprint information and iris information of a target unlocking person, and judging whether the identity card information, the fingerprint information and the iris information of the target unlocking person are consistent; if yes, calculating second unlocking information according to the first unlocking information and a first calculation rule, and judging whether the second unlocking information input by the target unlocking person is acquired within a first preset time length; if so, calculating third unlocking information according to the second unlocking information and a second calculation rule, and judging whether the third unlocking information input by the target unlocking person is acquired within a second preset time length; if so, sending the identity card information, the fingerprint information and the iris information of the target unlocking person to an auditing platform for auditing, and judging whether authorization information that an appointed administrator agrees to unlock can be obtained within a third preset time length; if so, the intelligent lock is unlocked, and the identity card information, the fingerprint information and the iris information of the target unlocking person are stored to the designated address.
The fourth technical scheme of the embodiment of the invention is as follows:
a computer-readable storage medium storing a computer program which, when executed by a processor, causes the processor to perform the steps of: acquiring first unlocking information, wherein the first unlocking information comprises identity card information, fingerprint information and iris information of a target unlocking person, and judging whether the identity card information, the fingerprint information and the iris information of the target unlocking person are consistent; if yes, calculating second unlocking information according to the first unlocking information and a first calculation rule, and judging whether the second unlocking information input by the target unlocking person is acquired within a first preset time length; if so, calculating third unlocking information according to the second unlocking information and a second calculation rule, and judging whether the third unlocking information input by the target unlocking person is acquired within a second preset time length; if so, sending the identity card information, the fingerprint information and the iris information of the target unlocking person to an auditing platform for auditing, and judging whether authorization information that an appointed administrator agrees to unlock can be obtained within a third preset time length; if so, the intelligent lock is unlocked, and the identity card information, the fingerprint information and the iris information of the target unlocking person are stored to the designated address.
The embodiment of the invention has the following beneficial effects:
the invention ensures that the target unlocking person inputs the unlocking information in steps, the unlocking information of each time is different, the unlocking information of each time needs to be calculated by combining the appointed calculation rule and the unlocking information of the last time, in addition, an appointed administrator needs to examine and verify the personal information of the target unlocking person, and finally, whether the target unlocking person is authorized or not can be determined, thereby greatly ensuring the unlocking safety of the intelligent lock and recording the information of the unlocking person.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a flowchart illustrating an implementation of a control method of an intelligent lock according to an embodiment, and referring to fig. 1, the control method of the intelligent lock according to the embodiment includes the following steps:
step S101: acquiring first unlocking information, wherein the first unlocking information comprises identity card information, fingerprint information and iris information of a target unlocking person, and judging whether the identity card information, the fingerprint information and the iris information of the target unlocking person are consistent or not. Firstly, the information of the unlocking person is checked, and the personal identity information of the unlocking person is recorded so as to be well documented.
Step S102: and if the identity card information, the fingerprint information and the iris information of the target unlocking person are consistent, calculating second unlocking information according to the first unlocking information and the first calculation rule, and judging whether the second unlocking information input by the target unlocking person is acquired within a first preset time length. The second unlocking information calculated according to the first unlocking information and the first calculation rule is related to the current time and is a variable.
Step S103: if the second unlocking information input by the target unlocking person is obtained within a first preset time, calculating third unlocking information according to the second unlocking information and a second calculation rule, and judging whether the third unlocking information input by the target unlocking person is obtained within a second preset time. The third unlocking information calculated according to the second unlocking information and the second calculation rule is related to the sex and the current time of the target unlocking person and is also a variable.
Step S104: if the third unlocking information input by the target unlocking person is obtained within a second preset time, the identity card information, the fingerprint information and the iris information of the target unlocking person are sent to an auditing platform for auditing, and whether authorization information that a designated administrator agrees to unlock can be obtained within a third preset time is judged.
Step S105: if the authorization information that the appointed administrator agrees to unlock can be acquired within a third preset time, the intelligent lock is unlocked, and the identity card information, the fingerprint information and the iris information of the target unlocking person are stored to the appointed address.
In this embodiment, optionally, the calculating second unlocking information according to the first unlocking information and the first calculation rule includes:
firstly, acquiring birth year, month and day information and current year, month and day information corresponding to the identity card information of the target unlocking person. If the date of birth of the target unlocking person is 5-18 months in 1985, the current year, month and day is 8-20 months in 2020.
And secondly, subtracting a first year number, a first month number and a first day number corresponding to the current year, month and day information from a second year number, a second month number and a second day number corresponding to the birth year, month and day information to obtain a year difference absolute value, a month difference absolute value and a day difference absolute value. The date of birth of the target unlocking person is 1985, 5, 18 days, and the current time of year, month and day is 2020, 8, 20 days, so that the annual difference absolute value is 2020-.
Thirdly, summing the annual difference absolute value, the lunar difference absolute value and the solar difference absolute value to obtain a target summation result, and using the target summation result as the second unlocking information. As a result of the above calculation, the target sum result is 15+3+ 2-20.
In this embodiment, optionally, calculating third unlocking information according to the second unlocking information and a second calculation rule includes:
firstly, acquiring gender information corresponding to the identity card information of the target unlocking person and time period information of the current time. The gender information corresponding to the identity card information comprises a male and a female, and the time period information of the current time comprises two time periods of 23: 00-11: 00 and 11: 00-23: 00.
Secondly, if the gender information corresponds to a male, adding a first number to the target summation result, and if the gender information corresponds to a female, adding a second number to the target summation result to obtain a gender summation result. Wherein the first number is optionally 1 but not limited to 1, and the sum of the target sum result and the gender of the first number is: 20+1 ═ 21; wherein the second number is 2 but not limited to 2, and the sum of the target sum result and the gender of the second number is: 20+ 2-22. In the step, the sex of the target unlocking person is preferably male, and the sex summation result is 22.
And thirdly, if the time period information corresponds to a first time period, adding a third number to the gender summation result, and if the time period information corresponds to a second time period, subtracting a fourth number from the gender summation result to obtain third unlocking information.
Wherein the first time period is 23: 00-11: 00 and corresponds to the third number, and the second time period is 11: 00-23: 00 and corresponds to the fourth number. In this step, the optional third number is 1 but not limited to 1, and the optional fourth number is 2 but not limited to 2. If the current unlocking time point is just 11:00, the current unlocking time point belongs to the second time period, and if the current unlocking time point is just 23:00, the current unlocking time point belongs to the first time period. On the premise that the target unlocking person is a male, if the time period information corresponds to the first time period, adding a third number to the gender summation result, namely 22+1 is 23; if the time period information corresponds to a second time period, a fourth number, 22-2-20, is subtracted from the gender summation result.
In this embodiment, optionally, the determining whether the identification card information, the fingerprint information, and the iris information of the target unlocking person are consistent includes:
if the identity card information, the fingerprint information and the iris information of the target unlocking person are inconsistent, recording the identity card information, the fingerprint information and the iris information of the target unlocking person, and sending the current time point, the identity card information, the fingerprint information and the iris information of the target unlocking person to a specified platform for alarming. The identity card information, the fingerprint information and the iris information of the target unlocking person are inconsistent, so that the identity of the target unlocking person is suspicious, and the target unlocking person is possibly a thief and needs to be reminded to record the target unlocking person in a case for later case finding.
In this embodiment, optionally, the determining whether the unlocking authorization information of the designated administrator can be acquired within a third preset time period includes:
if the authorization information that the designated administrator agrees to unlock cannot be acquired within the third preset time, recording the identity card information, the fingerprint information and the iris information of the target unlocking person, and reminding the designated administrator to perform unlocking authorization processing.
In this embodiment, optionally, the unlocking the smart lock, and storing the identification card information, the fingerprint information, and the iris information of the target unlocking person to a designated address, and then includes:
firstly, if the locking signal of the intelligent lock is not detected within a fourth preset time, prompting the target unlocking person to carry out locking operation, and judging whether the locking signal is received within a fifth preset time.
And secondly, if the locking signal is not received within a fifth preset time, locking the intelligent lock, and warning the behavior that the target unlocking person does not lock.
In this embodiment, optionally, after determining whether the identification card information, the fingerprint information, and the iris information of the target unlocking person are consistent, and before calculating the second unlocking information according to the first unlocking information and the first calculation rule, the method includes:
if the identity card information, the fingerprint information and the iris information of the target unlocking person are consistent, but the identity card corresponding to the identity card information of the target unlocking person is overdue, the second unlocking information is not calculated according to the first unlocking information and the first calculation rule, and the identity card information of the target unlocking person is recorded and the target unlocking person is warned.
As shown in fig. 2, in another embodiment, a control device 100 of an intelligent lock is provided, which can be obtained with reference to fig. 2, and the control device 100 of the intelligent lock specifically includes:
the information obtaining module 10 is configured to obtain first unlocking information, where the first unlocking information includes identification card information, fingerprint information, and iris information of a target unlocking person, and determine whether the identification card information, the fingerprint information, and the iris information of the target unlocking person are consistent. Firstly, the information of the unlocking person is checked, and the personal identity information of the unlocking person is recorded so as to be well documented.
The first judging module 20 is configured to calculate second unlocking information according to the first unlocking information and the first calculation rule when the identification card information, the fingerprint information, and the iris information of the target unlocking person are consistent, and judge whether to acquire the second unlocking information input by the target unlocking person within a first preset time period. The second unlocking information calculated according to the first unlocking information and the first calculation rule is related to the current time and is a variable.
The second determining module 30 is configured to, when the second unlocking information input by the target unlocking person is obtained within the first preset time period, calculate third unlocking information according to the second unlocking information and a second calculation rule, and determine whether the third unlocking information input by the target unlocking person is obtained within a second preset time period. The third unlocking information calculated according to the second unlocking information and the second calculation rule is related to the sex and the current time of the target unlocking person and is also a variable.
And the third judging module 40 is configured to, when the third unlocking information input by the target unlocking person is obtained within the second preset duration, send the identification card information, the fingerprint information, and the iris information of the target unlocking person to an auditing platform for auditing, and judge whether the authorization information that the specified administrator agrees to unlock can be obtained within a third preset duration.
And the authorized unlocking module 50 is configured to unlock the intelligent lock when the authorized information that the designated administrator agrees to unlock the intelligent lock can be acquired within the third preset time period, and store the identification card information, the fingerprint information and the iris information of the target unlocking person to a designated address.
FIG. 3 is a diagram illustrating an internal structure of a computer device in one embodiment. The computer device may specifically be a terminal, and may also be a server. As shown in fig. 3, the computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the memory includes a non-volatile storage medium and an internal memory. The non-volatile storage medium of the computer device stores an operating system and may also store a computer program that, when executed by the processor, causes the processor to implement the age identification method. The internal memory may also have a computer program stored therein, which when executed by the processor, causes the processor to perform the age identification method. Those skilled in the art will appreciate that the architecture shown in fig. 3 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In another embodiment, a computer device is presented, comprising a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to perform the steps of:
acquiring first unlocking information, wherein the first unlocking information comprises identity card information, fingerprint information and iris information of a target unlocking person, and judging whether the identity card information, the fingerprint information and the iris information of the target unlocking person are consistent; if yes, calculating second unlocking information according to the first unlocking information and a first calculation rule, and judging whether the second unlocking information input by the target unlocking person is acquired within a first preset time length; if so, calculating third unlocking information according to the second unlocking information and a second calculation rule, and judging whether the third unlocking information input by the target unlocking person is acquired within a second preset time length; if so, sending the identity card information, the fingerprint information and the iris information of the target unlocking person to an auditing platform for auditing, and judging whether authorization information that an appointed administrator agrees to unlock can be obtained within a third preset time length; if so, the intelligent lock is unlocked, and the identity card information, the fingerprint information and the iris information of the target unlocking person are stored to the designated address.
In another embodiment, a computer-readable storage medium is proposed, in which a computer program is stored which, when executed by a processor, causes the processor to carry out the steps of:
acquiring first unlocking information, wherein the first unlocking information comprises identity card information, fingerprint information and iris information of a target unlocking person, and judging whether the identity card information, the fingerprint information and the iris information of the target unlocking person are consistent; if yes, calculating second unlocking information according to the first unlocking information and a first calculation rule, and judging whether the second unlocking information input by the target unlocking person is acquired within a first preset time length; if so, calculating third unlocking information according to the second unlocking information and a second calculation rule, and judging whether the third unlocking information input by the target unlocking person is acquired within a second preset time length; if so, sending the identity card information, the fingerprint information and the iris information of the target unlocking person to an auditing platform for auditing, and judging whether authorization information that an appointed administrator agrees to unlock can be obtained within a third preset time length; if so, the intelligent lock is unlocked, and the identity card information, the fingerprint information and the iris information of the target unlocking person are stored to the designated address.
The invention ensures that the target unlocking person inputs the unlocking information in steps, the unlocking information of each time is different, the unlocking information of each time needs to be calculated by combining the appointed calculation rule and the last unlocking information, the calculation rule is associated with the current time and the identity information of the target unlocking person, so that the unlocking password is not a fixed password, in addition, an appointed manager needs to examine and verify the personal information of the target unlocking person, and finally, whether the unlocking is authorized or not can be determined, thereby greatly ensuring the unlocking safety of the intelligent lock and recording the information of the unlocking person.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a non-volatile computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the program is executed. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.